DATA MIGRATION AND COPYING IN A STORAGE SYSTEM WITH DYNAMICALLY EXPANSIBLE VOLUMES - When migrating data stored in a storage region assigned to a volume to another storage region, the connection status of the host computer and volume is confirmed. When the host computer and volume are connected, the maximum capacity of the volume requested by the host computer is reserved so that it is exclusively secured in another storage region to which data is to be migrated, and when the host computer and volume are not connected, the current capacity of the volume is reserved so that it is exclusively secured in another storage region.

2011-08-18

20110202743

METHOD AND INTERFACE FOR ALLOCATING STORAGE CAPACITIES TO PLURAL POOLS - Exemplary embodiments of the invention provide protocols and interfaces for avoiding waste capacity allocation from the storage apparatus to plural pools. In one embodiment, a storage system comprises a processor; a memory; and a storage controller. The storage controller is configured to: receive a declare chunk size command with a pool identifier for a pool among a plurality of pools, the declare chunk size command specifying a desired chunk size at the pool; receive an allocate chunk command with a pool identifier for allocating a chunk to a logical volume; and provide chunks of different chunk sizes to different pools with different pool identifiers, according to the desired chunk sizes of different declare chunk size commands and in response to different allocate chunk commands.

2011-08-18

20110202744

HASHING WITH HARDWARE-BASED REORDER USING DUPLICATE VALUES - A hash table controller may include a hash calculator configured to receive a key and to determine, based thereon, a first entry in a first bank of a hash table for a value associated with the key and determine a second entry in a second bank of the hash table for the value. The hash table controller also may include a table operations manager configured to determine that the first entry and the second entry are empty, and to store the value and a duplicate of the value at both the first entry and the second entry, respectively.

2011-08-18

20110202745

METHOD AND APPARATUS FOR COMPUTING MASSIVE SPATIO-TEMPORAL CORRELATIONS USING A HYBRID CPU-GPU APPROACH - A CPU may select a variable from a variable set as a dependent variable. The variable set may be part of the data structure that includes a plurality of vector values, a vector value associated with a variable set of n number of variables, and each variable of the variable set having a variable value. The number of dependent variable steps for the dependent variable may be determined. The number of the vector values in a dependent variable step is determined as being number of independent variables. A function is mapped to a plurality of thread processors, and each thread processor is assigned for the function to be performed on each one of the independent variables for each of the dependent variable steps.

2011-08-18

20110202746

PROCESSING ARCHITECTURE - The invention is directed towards a processing apparatus for a portable communication device. The apparatus includes: a central processing unit, first and second digital signal processing units, a first dual port memory unit adapted to store data shared between the central processing unit and the first digital signal processing unit, and a second dual port memory unit adapted to store data shared between the central processing unit and the second digital signal processing unit. The first dual port memory unit is adapted to store data shared between the first and second digital signal processing units without using the central processing unit.

2011-08-18

20110202747

INSTRUCTION LENGTH BASED CRACKING FOR INSTRUCTION OF VARIABLE LENGTH STORAGE OPERANDS - A method, information processing system, and computer program product manage variable operand length instructions. At least one variable operand length instruction is received. The at least one variable operand length instruction is analyzed. A length of at least one operand in the variable operand length instruction is identified based on the analyzing. The at least one variable operand length instruction is organized into a set of unit of operations. The set of unit of operations are executed. The executing increases one or more performance metrics of the at least one variable operand length instruction.

2011-08-18

20110202748

LOAD PAIR DISJOINT FACILITY AND INSTRUCTION THEREFORE - A Load/Store Disjoint instruction, when executed by a CPU, accesses operands from two disjoint memory locations and sets condition code indicators to indicate whether or not the two operands appeared to be accessed atomically by means of block-concurrent interlocked fetch with no intervening stores to the operands from other CPUs. In a Load Pair Disjoint form of the instruction, the accesses are loads and the disjoint data is stored in general registers.

2011-08-18

20110202749

INSTRUCTION COMPRESSING APPARATUS AND METHOD - An instruction compressing apparatus and method for a parallel processing computer such as a very long instruction word (VLIW) computer, are provided. The instruction compressing apparatus includes a bundle code generating unit, an instruction compressing unit, and an instruction converting unit. The bundle code generating unit may generate a bundle code in response to an input of instructions to be compressed. The bundle code may indicate whether a current instruction group is terminated, and also whether an instruction group following the current instruction group is a no-operation (NOP) instruction group. The instruction compressing unit may remove a NOP instruction and/or a NOP instruction group from the input instructions according to the generated bundle code. The instruction converting unit may include the generated bundle code in the remaining instructions which have not been removed by the instruction compressing unit.

2011-08-18

20110202750

RULE-BASED ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Described herein are various techniques and principles for determining how to assign control of peripherals and assigning control of peripherals. In some embodiments, determining how to assign control of peripherals comprises reviewing connections of peripherals to the computing device and evaluating rules to determine management points in the connections. In some cases, the connections of peripherals to the computing device may be organized into a hierarchy corresponding to a hierarchy of physical connections of the peripherals, including physical connections of peripherals located remote from the computing device and possibly connected through another computing device. When management points are identified among the connections, control of peripherals associated with the management points may be assigned in the same way. For example, access rights to each of the peripherals may be assigned to a same user session.

2011-08-18

20110202751

USER TERMINAL, SERVER AND CONTROLLING METHOD THEREOF - A user terminal is provided, including a communication interface unit which receives an application content at least part of which is encrypted, a storage unit which stores the received application content, a decryption unit which decrypts the application content, a user interface unit which receives a command to execute the application content, and a controlling unit which controls the decryption unit to install an application content stored in the storage unit in an encrypted state and decrypt the installed application content according to the execution command. Accordingly, an application, which is an executable content, may be downloaded and installed in a user terminal, and used and updated safely.

CUSTOMISATION OF NOTIFICATIONS PROVIDED BY A COMPUTER APPARATUS - A notification system in a computer apparatus may be customized by connection of a removable storage medium device to a storage medium interface of the computer apparatus. It is detected whether, in the storage medium thereof, there is stored customisation data that includes notification data of additional notifications. If so, the notification data in the computer apparatus is changed to include the notification data of additional notifications.

2011-08-18

20110202754

USAGE MODE DETERMINATION OF NAVIGATION SYSTEM - A navigation system determines its usage mode. In some embodiments, a method comprises determining a usage mode of a navigation system based on at least one of an acceleration indicator, a speed indicator, and a magnet sensor. The usage mode is at least one of a pedestrian mode, a vehicular mode, an aerial mode, a train mode, and a marine mode. The method further comprises configuring a navigation subsystem based on the usage mode.

2011-08-18

20110202755

SYSTEMS AND METHODS FOR SECURING DATA IN MOTION - Two approaches are provided for distributing trust among a set of certificate authorities. Both approaches are equally secure. In each approach, a secure data parser is integrated with any suitable encryption technology. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels. Accordingly, trust is distributed among a set of certificate authorities in the structure of the communication channel itself.

2011-08-18

20110202756

SECURE ENCRYPTED EMAIL SERVER - A computing system utilizing a local or remote secure email server that intercepts secure message that include an identifying domain extension provides secure data transmissions between internet or intranet users. The secure email messages can only be accessed from the secure email server by an intended recipient.

APPARATUS FOR PROVIDING SECURITY OVER UNTRUSTED NETWORKS - A network security apparatus adapted to provide for secure communications across data networks, including untrusted networks. In one embodiment, the security apparatus comprises one or more components disposed within the software stack of a computerized device, the components including an association process adapted to establish security associations between devices on the network, and an encryption key generation process adapted to generate one or more encryption keys. In one variant, the keys are specifically for use with temporary or ad hoc security associations. The one or more keys are exchanged according to a key exchange protocol after the device is authenticated or authenticates another device. In one implementation, the device comprises a portable device such as a laptop computer.

2011-08-18

20110202759

CERTIFICATE REMOTING AND RECOVERY - Certificate remoting and recovery may be provided. A computer may identify required security certificates and determine whether at least one required security certificate is not available. If the certificate is not available, the computer may identify a peer server and request the missing certificate from the peer server. The computer may also be operative to receive certificate management instructions from other computers.

2011-08-18

20110202760

METHOD FOR IDENTIFYING MOBILE STATION - A data transmission and reception method for ensuring privacy and security and a method for identifying a Mobile Station (MS), while ensuring the location privacy of the MS in a wireless access system are disclosed. The MS identification method includes transmitting a ranging request message including a hashed Medium Access Control (MAC) address to a Base Station (BS), for initial ranging, and receiving a ranging response message including a temporary station Identifier (ID) from the BS. The temporary station ID is used to provide security to a MAC address or station ID by which the BS uniquely identifies the MS.

2011-08-18

20110202761

Mobility Handling For Multicast Services - A method of handling mobility of a sender in a multicast packet sending scenario. The method comprises firstly establishing a multicast tree across a packet data network and transmitting multicast packets from the sender to a plurality of receivers via said multicast tree. Prior to a mobility event in respect of said sender, a suitable transfer anchor node is identified within said network, and the tree re-rooted to that transfer anchor node. Subsequently, multicast packets are transmitted from said sender to said transfer anchor node and injected into the multicast tree at said transfer anchor node. Following said mobility event, said sender continues to send multicast packets to said transfer anchor node for injection into the multicast tree.

2011-08-18

20110202762

METHOD AND APPARATUS FOR CARRYING OUT SECURE ELECTRONIC COMMUNICATION - The present invention provides a system, method and device, for carrying out secure electronic communication over a computer network via a computer susceptible of being virus infected or eavesdropped by means of a personal apparatus comprising processing means, one or more memory devices, one or more interfacing means suitable for exchanging information with the insecure computer, and a communication software having cryptographic capabilities stored in the one or more memory means, wherein the personal apparatus is adapted to establish a secure channel with a remote computer over the computer network, by means of the insecure computer machine.

2011-08-18

20110202763

TAPE BACKUP METHOD - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

2011-08-18

20110202764

DATA REFERENCE SYSTEM, DATABASE PRESENTATION/DISTRIBUTION SYSTEM, AND DATA REFERENCE METHOD - An element-data generating device encrypts respective vectors each including plural pieces of data, generates a vector including encrypted texts, and outputs such a vector as element data. A database generating system has plural first distributed devices and outputs a sequence of all pieces of element data as a database. A database presentation system has plural second distributed devices, generates, based on a reference item specifying an item to be referred, plural sequences of data to be referred from the database, and performs order shuffling of individual elements of the sequences of the data by all of the second distributed devices so that the order shuffling of the elements of the data sequence is consistent throughout all data sequences.

2011-08-18

20110202765

SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERS - A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the different computing device can access the protected key by authentication. For example, the user may be authenticated to a server. Because the guest operating system is encrypted by an encryption device on a source computing device, the virtual hard disk drive can be decrypted with a copy of the key.

2011-08-18

20110202766

METHOD AND APPARATUS FOR EFFICIENT AND SECURE CREATING, TRANSFERRING, AND REVEALING OF MESSAGES OVER A NETWORK - An encryption based method of enabling a plurality of parties to share, create, hide, or reveal message or token information over a network includes a commutative group cipher (CGC), where the underlying CGC is secure against ciphertext-only attack (COA) and plaintext attacks (KPA), and is deterministic. The protocols do not require a trusted third party (TTP), and execute rapidly enough on ordinary consumer computers as to be effective for realtime play among more than two players. Protocols are defined which include VSM-L-OL, VSM-VL, VSM-VPUM, and VSM-VL-VUM, wherein the letters V, O, SM, P, and UM represent, respectively, Verified, Locking Round, Open, Shuffle-Masking Round, Partial, and Unmasking Round.

APPARATUS FOR MANAGING IDENTITY DATA AND METHOD THEREOF - An apparatus and a method for managing identity data are disclosed, which can recover lost or deleted ID data stored in a user terminal and prevent a malicious user to plagiarize a user's ID. The apparatus includes a user ID management device (

2011-08-18

20110202769

SYSTEM AND METHOD FOR DETECTING COPY OF SECURE MICRO - A Secure Micro (SM) copy detection system includes at least one Access Point (AP) that is connected to at least one host group including at least one SM, at least one Multiple-Services Operator (MSO) that is used to manage the at least one SM and includes the at least one AP, and a host information management server that is used to perform authentication of the at least one SM and that is independently connected to the at least one MSO.

2011-08-18

20110202770

SECURITY OF DATA OVER A NETWORK - A method for securing data transmitted over a network to an image display device. In one embodiment, the method may include identifying at least one image display device on the network, selecting the at least one image display device for transmission of data, activating a data protection process to generate locked data and transmitting the locked data to the image display device. The method may further include receiving a key to unlock the locked data such that the data is available to the image display device.

2011-08-18

20110202771

Method for governing the ability of computing devices to communicate - A method is provided to perform network access control. A computing device utilising Online Certificate Status Protocol responder functionality determines whether attempted communication should be allowed between other computing devices appropriately configured with Internet Protocol Security (IPsec), digital certificates and OCSP client software. This determination is based on a set of rules considering the role or roles of the computing devices attempting to communicate, and whether the computing devices attempting to communicate have previously exhibited suspicious or undesirable behaviour.

Method of generating a password protocol using elliptic polynomial cryptography - The method of generating password protocols based upon elliptic polynomial cryptography provides for the generation of password protocols based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.

2011-08-18

20110202774

System for Collection and Longitudinal Analysis of Anonymous Student Data - A method and system for aggregating and anonymizing student data is disclosed. A method includes receiving from an educational institution a set of student data records, each student data record associated with a student and including a unique identifier, and lacking information rendering the record personally identifying of a student. The method further includes, for each student data record, extracting the unique identifier associated with the student data record, and encrypting the unique identifier. The method also includes associating the encrypted unique identifier with the student data record to form an anonymized student data record and storing the anonymized student data record in a database containing aggregated student data.

2011-08-18

20110202775

ATOMIC HASH INSTRUCTION - A method for performing a hash operation, including providing an atomic hash instruction that directs a microprocessor to perform a the hash operation and to indicate whether the hash operation has been interrupted by an interrupting event; translating the atomic hash instruction into first and second micro instructions; via a hash unit, first executing the first micro instructions to accomplish the hash operation according to the hash mode; and via an integer unit, second executing the second micro instructions in parallel with the first executing to test a bit in a flags register, to update text pointer registers, and to process interrupts during execution of the hash operation. The atomic hash instruction has an opcode field, configured to prescribe the hash operation, and a hash mode field, configured to prescribe that the microprocessor accomplish the hash operation according to a one of a plurality of hash modes.

2011-08-18

20110202776

Storage Device Content Authentication - Systems and methods that support storage device content authentication are provided. A system that verifies storage device content received from a storage device may comprise, for example, a security processor coupled to the storage device. The security processor may be adapted to receive a partitioned storage device region from the storage device. The partitioned storage device region may comprise, for example, regional content and first hashed regional content. The security processor may generate, for example, second hashed regional content by performing a hashing function on the regional content received by the security processor. The security processor may compare, for example, the first hashed regional content to the second hashed regional content. The security processor may verify the regional content received by the security processor if the first hashed regional content is the same as the second hashed regional content.

2011-08-18

20110202777

Power Module for Information Handling System and Methods Thereof - An information handling system can receive power from a wireless or wired power source. In response to determining the information handling system is coupled to the wired power source, the system decouples the wireless power source from providing power. In response to the system being decoupled from the wired power source, the information handling system couples the wireless power source to the system.

2011-08-18

20110202778

METHOD AND APPARATUS FOR MANAGING POWER FROM A SEQUESTERED PARTITION OF A PROCESSING SYSTEM - A processing system may include a first processing unit for a legacy partition and a second processing unit for a sequestered partition. In one embodiment, a first interrupt handler in the legacy partition may support power management for the first processing unit. A second interrupt handler in the sequestered partition may cause the sequestered partition to take control of power management hardware in the processing system when the legacy partition enters reduced power mode. For example, the second interrupt handler may program the power management hardware to route interrupts to the second processing unit. The sequestered partition may relinquish control of power management hardware to the legacy partition when the legacy partition exits reduced power mode. A power policy manager in the sequestered partition may support features such as wake for incoming communications, wake to record, etc. Other embodiments are described and claimed.

2011-08-18

20110202779

METHOD AND SYSTEM FOR MONITORING MODULE POWER STATUS IN A COMMUNICATION DEVICE - A method for monitoring operating status of a device includes receiving within a chip, a plurality of signals, each of the plurality of signals being indicative of a power status of a respective one of a plurality of on-chip devices. The method may also include generating from within the chip, a corresponding plurality of output signals. Each of the corresponding plurality of output signals respectively being indicative of the power status of the respective one of the plurality of on-chip devices. Each of the corresponding plurality of output signals may include a clock signal and a data signal. The corresponding plurality of output signals that are indicative of the power status may be output from the chip in a round robin manner. Each of the output signals that are indicative of the power status may be measured in real time by one or more resistor drops within the chip.

2011-08-18

20110202780

DATA WRITING METHOD FOR NON-VOLATILE MEMORY, AND CONTROLLER AND STORAGE SYSTEM USING THE SAME - A data writing method for writing data from a host system into a plurality of memory dies of a rewritable non-volatile memory storage apparatus is provided. The data writing method includes determining whether the data transmission interface of the host system complies with a first interface standard or a second interface standard. The data writing method also includes using a general mode to write the data into the memory dies when the data transmission interface of the host system complies with the first interface standard and using a power saving mode to write the data into the memory dies when the data transmission interface of the host system complies with the second interface standard. Accordingly, the data writing method can effectively prevent the stability of the rewritable non-volatile memory storage apparatus from reducing due to insufficient power supplied by the data transmission interface.

2011-08-18

20110202781

System and Method for Loop Timing Update of Energy Efficient Physical Layer Devices Using Subset Communication Techniques - A system and method for loop timing update of energy efficient physical layer devices using subset communication techniques. During a quiet period during which a subset of communication channels are transitioned from an active mode to a low-power mode, circuitry in the active channel can be designed to track, on behalf of the inactive channels, the phase drift due to the frequency offset. This tracking of the frequency estimation error would reduce the time required to perform a timing update for the communication channels when transitioning back to the active mode.

2011-08-18

20110202782

ARCHITECTURE INCORPORATING CONFIGURABLE CONTROLLER FOR REDUCING ON CHIP POWER LEAKAGE - The present invention provides a method and system for controlling leakage power consumption at a System on Chip (SoC) level during a normal run or a boot-up mode. The leakage power reduction is achieved by incorporating a central programmable controller in the SoC architecture and test structures of idle SoC peripherals to place them into an Absolute Minimum Power consumption state with respect to static and dynamic power.

POWER SUPPLY SYSTEM, POWERED DEVICE, AND POWER RECEPTION METHOD - Power sourcing equipment starts power supply after outputting a detection signal to a transmission line and detecting that a powered device is connected with the transmission line. The powered device includes a power storage unit configured to store power obtained from the detection signal output from the power sourcing equipment, and a correction unit configured to correct an impedance unbalance in the transmission line. The power storage unit provides the stored power to the correction unit.

2011-08-18

20110202785

METHOD AND DEVICE FOR SYNCHRONIZING DATA BROADCASTS - A method and a device for synchronizing broadcast of streaming data by a transmitting data processing unit to a plurality of receiving data processing units is provided. After a data word has been sent, a synchronizer in the transmitting data processing unit collects an acknowledge signal from each of the receiving data processing units and then generates an indication that the next data word can be transmitted. This allows to speed-up data delivery to parallel working processing units in a system-on-a-chip since data delivery has no longer to account for a maximum predictable latency of the respective receiving units.

2011-08-18

20110202786

Stalling synchronisation circuits in response to a late data signal - A data processing circuitry for processing data is disclosed. The data processing circuitry comprises: a plurality of synchronisation circuits for capturing and transmitting the data in response to a clock signal and a plurality of combinational circuits arranged between the synchronisation circuits for processing the data, the plurality of synchronisation circuits being arranged in at least two groups; an error detecting circuit for determining if the data input to one of the plurality of synchronisation circuits is stable during a predetermined time and for signalling an error if the data input is not stable, the predetermined time being less than a half cycle of the clock signal; control circuitry responsive to said error detecting circuit signalling said error to transmit a control signal to at least one of said groups of synchronisation circuits that contains a subsequent synchronisation circuit that said synchronisation circuit with said unstable input is configured to transmit said data to; each of said group of synchronisation circuits being configured to respond to receipt of said control signal to stall for a clock cycle and to transmit a stall signal to at least one further group of synchronisation circuits that said group of synchronisation circuits is configured to transmit data to or receive data from; each of said group of synchronisation circuits being configured to respond to receipt of said stall signal provided they have not stalled in a preceding clock cycle to stall for a clock cycle and to transmit a stall signal to said at least one further group of synchronisation circuits.

2011-08-18

20110202787

Single Wire Serial Interface - A single wire serial interface for power ICs and other devices is provided. To use the interface, a device is configured to include an EN/SET input pin. A counter within the device counts clock pulses sent to the EN/SET input pin. The output of the counter is passed to a ROM or other decoder circuit. The ROM selects an operational state for the device that corresponds to the value of the counter. In this way, control states may be selected for the device by sending corresponding clock pulses to the EN/SET pin. Holding the EN/SET pin high causes the device to maintain its operational state. Holding the EN/SET pin low for a predetermined timeout period resets the counter and causes the device to adopt a predetermined configuration (such as off) until new clock pulses are received at the EN/SET pin.

2011-08-18

20110202788

METHOD AND DEVICE FOR CLOCK GATE CONTROLLING - A method and an activity tracking device for controlling clock gating of a data processing block is provided. The processing block is one of a plurality of data processing blocks of a circuitry system interconnected by a streaming data bus. The activity tracking device receives a busy indication from processing units and streaming data bus segments of the data processing block to keep track of the data transfer and processing activity therein, and has an output connected to a clock gate at the root of the local clock distribution network of the data processing block to gate off the clock of the data processing block when an idle condition is detected, and to recover the clock when a wake-up condition is detected. This provides a low complexity way of automatic clock gating in SoC designs, and generally a way to reduce power consumption of electronic devices.

2011-08-18

20110202789

PROCESSOR-MEMORY UNIT FOR USE IN SYSTEM-IN-PACKAGE AND SYSTEM-IN-MODULE DEVICES - An apparatus and method for a processor-memory unit for use in system-in-package (SiP) and system-in-package (SiP) integrated circuit devices. The apparatus includes a processing module, a memory module and a programmable system module. The programmable system module is configured to function as an interface between the memory module and the processing module, or as an interface between the memory module and a testing device. The invention facilitates integration and testing of processor-memory units including functional components having different communication protocols.

2011-08-18

20110202790

Storage Configuration - Aspects of the subject matter described herein relate to storage configuration. In aspects, an interface is used to discover the existence, capacity, and characteristics of solid state storage. This information may be provided to a user or storage management process which may use the information to configure the solid state storage. When appropriate, bus bandwidth to the solid state storage as well as bandwidth to memory components of the solid state storage may be configured. Configuration and re-configuration may be performed automatically according to one or more policies maintained locally or remotely.

2011-08-18

20110202791

STORAGE CONTROL DEVICE , A STORAGE SYSTEM, A STORAGE CONTROL METHOD AND A PROGRAM THEREOF - A storage control device and a storage control method are provided. If a first failure detector of a first controller does not detect a failure in a second controller, a first input/output processor of the first controller copies the contents of a first volatile memory of the first controller to a second volatile memory of the second controller. On the other hand, if the first failure detector detects a failure in the second controller, the first input/output processor copies the contents of the first volatile memory to a first non-volatile memory of the first controller.

2011-08-18

20110202792

System and Methods for RAID Writing and Asynchronous Parity Computation - A computer storage management system for managing a first plurality of data storage units, the system including: (a) an asynchronous parity computation manager which, responsive to a write operation in which an incoming data portion is to be written into an individual storage unit from among the storage units, deposits the incoming value in the individual storage unit an stores a copy of the data element in a pre-parity storage area, and wherein asynchronously with depositing the incoming value in the individual storage unit, the asynchronous parity computation manager is operative to compute parity data corresponding to the incoming data portion and to other data portions which are associated with the incoming data portion and to store the parity data; and (b) a post-loss data recovery manager operative to recover lost data including determining whether at least one parity value associated with at least one data portion within said lost data is not current and, for at least one non-current parity, using information stored in the pre-parity storage area to generate, after said lost data has been lost, a current parity to replace said non-current parity and using said current parity to recover said lost data.

2011-08-18

20110202793

FAILURE SYSTEM FOR DOMAIN NAME SYSTEM CLIENT - A method performed by a domain name service client includes storing DNS entries in a local cache; sending a DNS query to another device to obtain an update to one of the DNS entries; determining whether a DNS response is received; and resetting a time-to-live (TTL) timer associated with the one of the DNS entries when the DNS response is not received.

DATA CORRUPTION PREVENTION DURING APPLICATION RESTART AND RECOVERY - Embodiments of the present invention are directed to a method and system for draining or aborting IO requests of a failed system prior to restarting or recovering an application in virtual environments. The method includes detecting, within an electronic system, an application error condition of an application executing on a virtual machine and determining an application restart target. The method further includes sending an input/output (IO) request drain command to a virtual IO server operable to provide storage to the virtual machine and receiving a signal that the IO requests have been drained. The drain command is operable to drain IO requests issued from the application. The application can then be restarted or recovered.

2011-08-18

20110202796

MICROPROCESSOR WITH SYSTEM-ROBUST SELF-RESET CAPABILITY - A microprocessor includes a bus interface unit that interfaces the microprocessor to a bus that includes a signal that, when asserted, instructs all bus agents to refrain from initiating bus transactions. Microcode causes the bus interface unit to assert the signal in response to detecting an event and resets the microprocessor, but does not reset a portion of the bus interface unit that asserts the signal on the bus. After the reset, the microcode causes the bus interface unit to deassert the signal on the bus. Additionally, the microcode sets a flag and saves the microprocessor state to memory before resetting itself, but does not reset the interrupt controller. After the reset, the microcode reloads the state of the microprocessor from the memory. However, if the microcode determines that the flag is set, it forgoes reloading the state of the interrupt controller.

2011-08-18

20110202797

METHOD AND SYSTEM FOR RESETTING A SUBSYSTEM OF A COMMUNICATION DEVICE - Described herein are a method, system, and computer readable medium for resetting a subsystem of a communication device. The method involves utilizing a subsystem error handler to generate a reset request signal indicating the subsystem has experienced an exception; distributing to a software component, residing externally to the subsystem, a status message indicative of a current state of the subsystem; performing a reset of the subsystem in response to the reset request signal; and rebooting the subsystem. When the subsystem can be reset without performing a system wide reset of the communication device, communication device downtime is reduced, which facilitates a positive user experience.

2011-08-18

20110202798

REMOTE TECHNICAL SUPPORT EMPLOYING A CONFIGURABLE EXECUTABLE APPLICATION - In a remote technical support system, in response to a request for service, a user device receives an executable application from the technical support controller, which executable application is subsequently invoked at the user device. Additionally, the user device receives configuration information from the technical support controller. The executable application then performs technical support processing of the user device in accordance with the configuration information. The executable application can be configured, based on the configuration information, to engage in dynamic workflow, i.e., to make decisions about what activities to perform based on previous results. Because the configuration information can be selected according to the specific nature of the user device and/or the specific nature of the service request, the executable application can be tailored to best address the requesting end user's needs with minimal attention from a remote technician.

2011-08-18

20110202799

PROCESS FOR MAKING AN ELECTRIC TESTING OF ELECTRONIC DEVICES - The disclosure relates to a process for making an electric testing of electronic devices DUT, of the type comprising the steps of: connecting at least one electronic device DUT to an automatic testing apparatus or ATE apparatus suitable for making the testing of digital circuits; sending, through said ATE apparatus, control signals for the electric testing to said electronic device DUT. Advantageously, the process also comprises the steps of: making the electric testing of said electronic device DUT through at least one reconfigurable digital interface RDI connected to said ATE apparatus through a dedicated digital communication channel and comprising a limited number of communication or connection lines strictly appointed to the exchange of the testing information; and sending from said electronic device DUT to said ATE apparatus response messages, if any, containing measures, failure information and data in response to said control signals and through said digital communication channel.

2011-08-18

20110202800

PROGNOSTIC ANALYSIS SYSTEM AND METHODS OF OPERATION - A prognostic analysis system and methods of operating the system are provided. In particular, a prognostic analysis system for the analysis of physical system health applicable to mechanical, electrical, chemical and optical systems and methods of operating the system are described herein.

Supporting Detection of Failure Event - In a mechanism for supporting detection of a failure event, history information of a system including log information of the system including plural components and/or failure information output from each component upon occurrence of a failure in the system is collected. A detection rule for detecting an event included in a component related to the failure that has occurred is generated, and a symptom with additional information added to the generated detection rule is applied to detect the event that has caused the failure. System configuration information as configuration information of the system is acquired, and from the acquired system configuration information, partial configuration information as system configuration information related to the component that sent out the event the selection of which has been accepted is extracted. The extracted partial configuration information is added to the symptom to update the symptom.

Circuit And Method For Simultaneously Measuring Multiple Changes In Delay - A circuit and method provide built-in measurement of delay changes in integrated circuit paths. The circuit includes a digital shift register to access multiple paths, and may be implemented in digital boundary scan to test I/O pin delays. Synchronous to a first frequency, the circuit applies an alternating signal to the paths and samples the paths' output logic values synchronous with a second frequency that is asynchronous and coherent to the first clock frequency. The shift register conveys the samples to a modulo counter that counts the number of samples between consecutive rising or consecutive falling edges in the signal samples from a selected path. Between the two edges, the path or a path characteristic is changed, and the resulting modulo count after the second edge is proportional to the change in delay. The circuit can compare the count, or the difference between counts, to test limits.

2011-08-18

20110202805

Pulse Dynamic Logic Gates With Mux-D Scan Functionality - A scannable pulse dynamic logic gate may include an evaluation network that evaluates dynamic inputs in response to assertion of an evaluate pulse. The evaluate pulse may be generated from a clock signal such that it is shorter in duration than the clock signal. During a normal mode of operation, when the evaluate pulse is asserted, the evaluation network may discharge a dynamic node depending on the state of the dynamic inputs. The resultant state of the dynamic node may be stored within an output storage element. When the evaluate pulse is deasserted, the dynamic node may be precharged. During a scan mode of operation, the dynamic node may remain precharged. Scan data may be transferred to the output storage element under the control of scan-related control signals.

2011-08-18

20110202806

TAM CONTROLLER CONNECTED WITH TAM AND FUNCTIONAL CORE WRAPPER CIRCUIT - A device test architecture and interface is provided to enable efficient testing embedded cores within devices. The test architecture interfaces to standard IEEE 1500 core test wrappers and provides high test data bandwidth to the wrappers from an external tester. The test architecture includes compare circuits that allow for comparison of test response data to be performed within the device. The test architecture further includes a memory for storing the results of the test response comparisons. The test architecture includes a programmable test controller to allow for various test control operations by simply inputting an instruction to the programmable test controller from the external tester. The test architecture includes a selector circuit for selecting a core for testing. Additional features and embodiments of the device test architectures are also disclosed.

2011-08-18

20110202807

LOCK STATE MACHINE OPERATIONS UPON STP DATA CAPTURES AND SHIFTS - A process of selecting alternative test circuitry within an integrated circuit enables a test access port. Scan test instruction data is loaded into an instruction register of a test access port TAP, the instruction data including information for selecting the alternative test circuitry. An Update-IR instruction update operation is performed at the end of the loading to output scan test control signals from the instruction register. A lockout signal is changed to an active state to disable the test access port and enable scan test circuits.

2011-08-18

20110202808

REDUCED SIGNALING INTERFACE METHOD & APPARATUS - This disclosure describes a reduced pin bus that can be used on integrated circuits or embedded cores within integrated circuits. The bus may be used for serial access to circuits where the availability of pins on ICs or terminals on cores is limited. The bus may be used for a variety of serial communication operations such as, but not limited to, serial communication related test, emulation, debug, and/or trace operations of an IC or core design. Other aspects of the disclosure include the use of reduced pin buses for emulation, debug, and trace operations and for functional operations.

2011-08-18

20110202809

Pulse Flop with Enhanced Scan Implementation - In an embodiment, a clocked storage device such as a pulse flop is provided. The pulse flop includes a latch coupled to receive a scan data input to the pulse flop. The latch receives the scan data input during one of the phases of the clock, and retains the received input during the other phase. The other phase is the phase in which the pulse to the pulse flop occurs. Thus, when scan data is captured in the pulse flop, the latch at the next pulse flop in the chain may be closed and may prevent a race condition in propagating the scan data.

2011-08-18

20110202810

PULSE DYNAMIC LOGIC GATES WITH LSSD SCAN FUNCTIONALITY - A scannable pulse dynamic logic gate may include an evaluation network that evaluates dynamic inputs in response to assertion of an evaluate pulse. The evaluate pulse may be generated from a clock signal such that it is shorter in duration than the clock signal. During a normal mode of operation, when the evaluate pulse is asserted, the evaluation network may discharge a dynamic node depending on the state of the dynamic inputs. The dynamic node may then drive output device(s). When the evaluate pulse is deasserted, the dynamic node may be precharged. The gate may also include scan input devices, which, during a scan mode of operation, may load scan input data onto the output node in response to assertion of a scan master clock. A storage element of the gate may receive and capture a value of the output node in response to assertion of a slave scan clock.

2011-08-18

20110202811

TEST ACCESS PORT WITH ADDRESS AND COMMAND CAPABILITY - The disclosure provides a novel method and apparatus for inputting addresses to devices to select the device TAP for access. Further, the disclosure provides a novel method and apparatus for inputting addresses for selecting device TAPs and for inputting commands for commanding circuitry within the device. The inputting of addresses or the inputting of addresses and commands is initiated by a control bit input on TDI that is recognized during the Run Test/Idle, Pause-DR or Pause-IR TAP states.

2011-08-18

20110202812

SEMICONDUCTOR MEMORY DEVICE - According to one embodiment, a semiconductor memory device includes semiconductor memory chips in which data requested to be written. The data has one or more pieces of first data in a predetermined unit. The device includes a write controller that writes the first data and redundancy information calculated by using a predetermined number of pieces of the first data and used for correcting an error in the predetermined number of pieces of the first data into different semiconductor memory chips; and a storage unit that stores identification information and region specifying information so as to be associated with each other. The identification information associates the first data and the redundancy information, and the region specifying information specifies a plurality of storage regions in the semiconductor memory chips to which the pieces of the first data and the redundancy information associated with each other are written.

2011-08-18

20110202813

ERROR CORRECTION AND RECOVERY IN CHAINED MEMORY ARCHITECTURES - Electronic apparatus, systems, and methods to construct and operate the electronic apparatus and/or systems include a memory unit configured to receive data flow from two directions. The memory unit can be configured serially in a chain with other memory units. The chain can include an error check and correcting unit (ECC). Additional apparatus, systems, and methods are disclosed.

2011-08-18

20110202814

INTERLEAVING SCHEME FOR AN LDPC CODED 32 APSK SYSTEM - An approach is provided for interleaving low density parity check (LDPC) encoded bits in 32APSK modulation systems. By assigning the bits determining modulation symbols based on different bit degrees, one can efficiently find the desirable tradeoff between error performance and error floor provided by the LDPC codes in use.

2011-08-18

20110202815

ERROR DETECTION AND CORRECTION SYSTEM - An error detection and correction system in accordance with an embodiment comprises: an encoding unit; a syndrome calculating unit; a syndrome element calculating unit; an error search unit; and an error correction unit, read and write of a memory cell array being assumed to be performed concurrently for m bits, and error detection and correction being assumed to be performed in data units of M bits (where M is an integer multiple of m), and an encoding unit and a syndrome calculating unit sharing a time-division decoder for performing data bit selection according to respective tables of check bit generation and syndrome generation, the time-division decoder being operative to repeat multiple cycles of m bit concurrent data input.

2011-08-18

20110202816

Distributed processing LDPC (Low Density Parity Check) decoder - Distributed processing LDPC (Low Density Parity Check) decoder. A means is presented herein that includes an LDPC decoding architecture leveraging a distributed processing technique (e.g., daisy chain) to increase data throughput and reduce memory storage requirements. Routing congestion and critical path latency are also improved thereby. Each daisy chain includes a number of registers, and a number of localized MUXs (e.g., MUXs having merely 2 inputs each). The means presented herein also does not contain any barrel shifters, high fan-in multiplexers, or interconnection networks; therefore, the critical path is relatively short and it can also be pipelined to further increase data throughput. If desired, a communication device can include multiple configurations of such daisy chains to accommodate the decoding of various LDPC coded signals (e.g., such as for an application and/or communication device that must decoded LDPC codes using different low density parity check matrices).

2011-08-18

20110202817

NODE INFORMATION STORAGE METHOD AND SYSTEM FOR A LOW-DENSITY PARITY-CHECK DECODER - A receiver to receive a signal associated with a low-density parity-check (LDPC) code. The receiver includes a memory device, an address generator, and an LDPC decoder. The LDPC decoder includes a row designator and a position designator. The memory device stores data related to an LDPC decoding process. The address generator generates an access address to the stored data. The LDPC decoder performs the LDPC decoding process. The row designator designates a row from a parity-check matrix as a parent row and designates a plurality of corresponding rows from the parity-check matrix as child rows. The position designator designates an original position order of each parent non-zero element of 10 the parent row according to an actual position order of each parent non-zero element in the parent row. The actual position order includes a numerical order of the parent non-zero elements.

2011-08-18

20110202818

NON-VOLATILE MEMORY DEVICE AND OPERATION METHOD USING THE SAME - The non-volatile memory system includes a non-volatile memory and a controller. The non-volatile memory includes a data region including a sector region for storing sector data, and an uncorrectable information region for storing uncorrectable sector information on the sector region. The controller includes an information generation unit for generating the uncorrectable sector information that indicates whether the sector region is assigned to an uncorrectable sector region, according to a command output from a host.

2011-08-18

20110202819

Configurable Error Correction Encoding and Decoding - A system and method are disclosed performing error correction on data by a processor. Received data is demultiplexed into a first demultiplexer output and a second demultiplexer output. Stored instructions are executed by a processor to decode the first demultiplexer output and a deinterleaver output to produce a decoded output. Stored instructions are executed by a processor to interleave the decoded output to produce an interleaved output. Stored instructions are executed by a processor to decode the interleaved output and the second demultiplexer output to produce decoded data. Stored instructions are executed by a processor to deinterleave the decoded data. The deinterleaved data is output.

2011-08-18

20110202820

METHOD AND SYSTEM FOR PROVIDING LOW DENSITY PARITY CHECK (LDPC) ENCODING AND DECODING - An approach is provided for processing structure Low Density Parity Check (LDPC) codes. Memory storing edge information and a posteriori probability information associated with a structured parity check matrix used to generate Low Density Parity Check (LDPC) coded signal are accessed. The edge information represent relationship between bit nodes and check nodes, and are stored according to a predetermined scheme that permits concurrent retrieval of a set of the edge information.

2011-08-18

20110202821

BIDDED MARKETPLACE FOR APPLICATIONS - Methods and systems for presenting application modules on a graphical display page are provided. In accordance with one embodiment, content to be displayed on a graphical display page is determined. Then, content features which describe the content that is to be displayed on the graphical display page, and user features which describe characteristics of users are determined. For each application in the plurality of application modules, the probability that specific users will select the application module when displayed on the graphical display page with the determined content is determined based on the content features and the user features. For each application module in the plurality of application modules, an overall score is determined based on the determined probability that the user will select the application module and a commercial value to be paid by a publisher of the application module when it is selected. The recommended application modules are determined to be those application modules in the plurality of application modules which have the highest overall score and which satisfy a set of constraints. Representations of the recommended application modules are displayed on the graphical display page.

2011-08-18

20110202822

System and Method for Tagging Digital Media - A method for tagging digital media is described. The method includes selecting a digital media and selecting region within the digital media. The method may further include associating a person or entity with the selected region and sending a notification of the association the person or entity or a different person or entity. The method may further include sending advertising with the notification.

2011-08-18

20110202823

PASTING A SET OF CELLS - Pasting a set of cells is disclosed. In some embodiments, a selection of an option to paste a set of cells in a paste destination is received; and in response to determining that the paste destination is not large enough to accommodate a paste operation associated with the selected option, the paste destination is automatically expanded so that the paste destination is large enough to accommodate the paste operation.

System and Method of Annotating Non-modifiable Documents and Managing Annotations - Disclosed is an electronic note-taking program on a computer readable medium, such as a removable USB memory device, CD, internet server, or the like, which has a visual text (preferably, in PDF format) linked together with a word-processing program, such that a reader takes notes associated with the onscreen text. The program simultaneously displays the note-taking screen adjacent to the visual text, or also can switch back and forth between visually reading on a computer display screen and/or reading or printing the notes taken by the reader. The notes will automatically link to the place in the visual text, such that the reader can always see the notes in relation to the visual text. The computer readable medium can include the visual text along with the note-taking program installed thereon and an automatic installation program. The electronic note-taking program combines the advantages and cost savings of materials available in electronic form with the ability to annotate the materials in an electronic medium just as would be available in physical hard-cover materials.

Systems and Methods for Curating Content - Systems and methods for curating content. In one embodiment, a method for curating content from a set of third party webpages can be provided. The method can include aggregating content from the third party webpages, receiving an indication that content from one or more of the third party webpages has been selected, receiving an indication of a selected interface position for at least a portion of the selected content, and outputting an interface with the portion of selected content in the selected interface position.

2011-08-18

20110202828

METHOD AND SYSTEM FOR PRESENTING WEB PAGE RESOURCES - A method is disclosed for presenting specific resources on a computer having a web browser. The method includes accessing by the web browser a specific resource related to an original web page from a web server, obtaining attribute information of the specific resource, and identifying the specific resource contained in the original web page based on the obtained attribute information of the specific resource. Further, the method includes obtaining an independent window being independent from at least a web page window displaying the original web page, and presenting the identified specific resource in the independent window.

INSERTION POINT BUNGEE SPACE TOOL - A computer system and method for providing user feedback when creating, modifying, or editing electronic documents. An insertion point icon is placed in a document at a position for insertion and/or deletion of text, graphics, data, etc. Upon receiving a user input indicating movement, the insertion point icon is divided into two icons, one stationary at the position, and one moving with user input. When movement is complete, space contained between the icons may be deleted or inserted. The system may be used to shift handwritten text to subsequent lines on an electronic document containing handwritten text, and may be used to bring two groups of text together, deleting space in between. A connection line may be displayed between the icons to provide feedback regarding the action to be taken.

2011-08-18

20110202831

DYNAMIC CACHE REBINDING OF PROCESSED DATA - Generating a report involves phases such as (a) database queries or other raw data accesses, (b) calculations such as data grouping, sorting, filtering, aggregation, (c) data presentation layout, (d) data formatting, and (e) rendering. When generating a modified version of a report, reusable interim results for phases (b), (c), and (d) are identified and retrieved from a cache instead of being recalculated. Newly calculated interim results are also cached for possible future use.

2011-08-18

20110202832

INDICATORS OF TEXT CONTINUITY - Methods, systems, and apparatus, including computer programs encoded on computer storage media for graphically indicating text continuity. One method includes receiving text including a first line of text followed by a second line of text followed by a third line of text and selecting a distinct line beginning and line end of each of the first, second, and third lines of text. The method further includes formatting the text, including setting respective first attribute values for a first appearance attribute, so that, with respect to the first appearance attribute, the text has a continuity of visual appearance from the first line end to the second line beginning, and so that, with respect to the first appearance attribute, no continuity of visual appearance exists from the first line end to either the first line beginning or to the third line beginning, and presenting the formatted text on the output device.

2011-08-18

20110202833

METHOD AND APPARATUS FOR RECOGNIZING EXTERNAL MEMORY IN PORTABLE TERMINAL - Provided is a method and apparatus for recognizing an external memory in a portable terminal. The method includes sensing an insertion of the external memory and being requested, by a user, to recognize data stored in the external memory, and recognizing the entire stored data while displaying data one at a time or in its entirety depending on the processing speed of the terminal.

2011-08-18

20110202834

VISUAL MOTION FEEDBACK FOR USER INTERFACE - Aspects of a user interface that provides visual feedback in response to user input. For example, boundary effects are presented to provide visual cues to a user to indicate that a boundary in a movable user interface element (e.g., the end of a scrollable list) has been reached. As another example, parallax effects are presented in which multiple parallel or substantially parallel layers in a multi-layer user interface move at different rates, in response to user input. As another example, simulated inertia motion of UI elements is used to provide a more natural feel for touch input. Various combinations of features are described. For example, simulated inertia motion can be used in combination with parallax effects, boundary effects, or other types of visual feedback.

2011-08-18

20110202835

ITEM SELECTION METHOD FOR TOUCH SCREEN DEVICES - A user device may display content items in a content area on a touch screen display of the user device. The user device detects a touching of the touch screen display and determines a location of the touching. The user device divides the content area into a first content sub-area and a second content sub-area at a location proximate to the location of the touching, wherein a portion of the content corresponding to the touching is included in the first content sub-area. The user device shifts the first content sub-area away from the location of the touching to create a blank space between the first content sub-area and the second content sub-area.

2011-08-18

20110202836

TYPING ASSISTANCE FOR EDITING - Apparatus and methods are disclosed for providing feedback and guidance to touch screen device users to improve the text entry user experience and performance. According to one embodiment, a method comprises receiving a text entry, receiving input on a touch screen in the form of a first single touch input located over a word of previously entered text, and presenting the user with one or more suggestion candidates indicated possible replacement words related to the selected word. The user can then select one of the suggestion candidates using a second single touch input to replace the selected word with a word associated with the selected suggestion candidate.

2011-08-18

20110202837

MULTI-LAYER USER INTERFACE WITH FLEXIBLE PARALLEL AND ORTHOGONAL MOVEMENT - A user interface (UI) system calculates movements in a multi-layer graphical user interface. The UI system receives user input corresponding to gestures on a touchscreen. The UI system calculates a movement of a first layer in a first direction (e.g., a horizontal direction) at a first movement rate. The UI system calculates a movement of a second layer substantially parallel to the movement of the first layer, at a second movement rate that differs from the first movement rate. The UI system calculates a movement (e.g., a vertical movement) in a direction substantially orthogonal to the first direction, in a UI element of one of the layers.

2011-08-18

20110202838

APPARATUS AND METHOD FOR PROVIDING USER INTERFACE - A method of providing a user interface, including receiving a motion signal from a pointing device including a pointing function for moving a pointer, while the pointer is not generated on a display screen; generating the pointer when it is determined, based on the received motion signal, that the pointing device is moved in a predetermined form; displaying the generated pointer on the display screen; and providing a menu on at least one corner of the display screen.

2011-08-18

20110202839

CONFIGURABLE MULTILINGUAL KEYBOARD - Systems and methods for creating a configurable multi-language, research and application keyboard tool. A configurable keyboard system includes a font editor/generator for modifying and creating new characters, a language database for storing characters of one or more alphabets, a user interface for display outputs and accepting inputs from a user, and a layout generator for configuring a dynamic keyboard display and displaying the keyboard display on the user interface. Characters from one or more languages may be grouped in proximity to each other on the keyboard display based on common phonetic sounds.

2011-08-18

20110202840

REUSABLE MEDIA SOURCES FOR ONLINE BROADCAST DATA - A broadcaster-specific service module is provided for applications hosted by a processing device. The broadcaster-specific service module and the applications communicate through a common service bus. The broadcaster-specific service module receives items from an online broadcaster via a network, with each item associated with a media file or stream available from the online broadcaster. The broadcaster-specific service module generates a catalog containing a tree of the items, and sends the catalog to a target application via the service bus to display the catalog for user selection. The broadcaster-specific service module formats data of the catalog can be understood by all of the applications attached to the service bus.

2011-08-18

20110202841

COMPUTER-BASED PROJECT MANAGEMENT - Computer-based methods for managing a project are disclosed. The computer-based method may include displaying a plurality of images in a first portion of a computer screen, each image of the plurality of images being representative of at least one of a service and a good; detecting movement of at least one image of the plurality of images from the first portion to a second portion of the computer screen spaced from the first portion; soliciting one or more vendors for proposals to provide at least one of a service and a good represented by the at least one image moved to the second portion; displaying the proposals received from the solicited vendors on the computer screen; and detecting approval of one or more of the displayed proposals.